A receiver, and a method for operating the receiver, for a station in a wireless local area network using a common wireless communication channel and employing a CSMA/CA (carrier sense multiple access with collision avoidance) protocol includes various modes. In normal mode, the receiver follows typical states in order to detect a message and demodulate data from the message properly. Meanwhile, a process implements a message-in-message (MIM) mode when an energy increase above a specified level is detected. While in the MIM mode, if a carrier is detected, the energy increase is caused by a new message; otherwise, the energy increase is caused by an interfering station. If the carrier is detected, the receiver begins retraining so that it can start receiving the new message as soon as the first message ends. If no carrier is detected, the receiver waits a specified time to detect a carrier or for the end of the first message, after which the receiver returns to the beginning of the normal mode. While in the normal mode, if a message is detected that is not addressed to the station, the receiver enters a hunt mode. While in the hunt mode, the receiver waits for the current message to finish. At the same time, a process implements retraining when both an energy increase above a specified level and a carrier are detected. If no carrier is detected within a specified time, or if the energy level decreases below the specified level, the receiver returns to the beginning of the normal mode.

Patent
   5987033
Priority
Sep 08 1997
Filed
Sep 08 1997
Issued
Nov 16 1999
Expiry
Sep 08 2017
Assg.orig
Entity
Large
155
11
all paid
1. A method for operating a receiver of a station in a wireless local area network using a common wireless communication channel and employing a CSMA/CA (carrier sense multiple access with collision avoidance) protocol, comprising the steps of:
detecting a message;
determining when said message is addressed to said station;
demodulating said message when said message is addressed to said station;
detecting a first energy increase above a first specified level when said message is being demodulated;
detecting a carrier upon detection of said first energy increase;
retraining upon detection of said carrier;
detecting a second energy increase above a second specified level;
detecting said carrier when said second energy increase is detected; and
retraining upon detection of said second energy increase and detection of said carrier,
wherein there is no transmission of a collision detect signal either after detecting said first energy increase or after detecting said second energy increase.
3. A receiver for a station in a wireless local area network using a common wireless communication channel and employing a CSMA/CA (carrier sense multiple access with collision avoidance) protocol, comprising:
first detecting means for detecting a message;
means for determining when said message is addressed to said station;
means for demodulating said message when said message is addressed to said station;
second detecting means for detecting a first energy increase above a first specified level when said message is being demodulated;
third detecting means for detecting a carrier upon detection of said first energy increase;
first retraining means for retraining upon detection of said carrier;
fourth detecting means for detecting a second energy increase above a second specified level;
fifth detecting means for detecting said carrier when said second energy increase is detected; and
second retraining means for retraining upon detection of said second energy increase and detection of said carrier,
wherein the receiver does not include means for transmitting a collision detect signal after detecting either said first or said second increase in energy.
2. A method according to claim 1, further comprising:
determining said first specified level; and
determining said second specified level.
4. A receiver according to claim 3, further comprising:
first determining means for determining said first specified level; and
second determining means for determining said second specified level.

The invention pertains to the field of wireless local area networks (LANs), and in particular, to a wireless LAN with an enhanced retrain control function to enhance the capture provision of a station in receive mode.

Wireless LANs are usually based on a medium access control (MAC) using a listen-before-talk scheme like carrier sense multiple access with collision avoidance (CSMA/CA) as described by the IEEE 802.11 standard. Such a scheme allows a station to start a transmission when there is no transmission active that is being received above a certain threshold level.

The IEEE 802.11 standard for wireless LANs is a standard for systems that operate in the 2,400-2,483.5 MHz industrial, scientific and medical (ISM) band. The ISM band is available worldwide and allows unlicensed operation for spread spectrum systems. IEEE 802.11 focuses on the MAC and physical layer (PHY) protocols for access point based networks and ad-hoc networks. IEEE 802.11 supports direct sequence spread spectrum (DSSS) with differential encoded BPSK and QPSK, frequency hopping spread spectrum (FHSS) with Gaussian FSK (GFSK), and infrared with pulse position modulation (PPM).

The basic medium access behavior allows interoperability between compatible physical layer protocols through the use of both CSMA/CA and a random backoff time following a busy medium condition. In addition, all directed traffic uses immediate positive acknowledgment (ACK frame), where retransmission is scheduled by the sender if no ACK is received. The CSMA/CA protocol is designed to reduce the collision probability between multiple stations accessing the medium at the point where they would most likely occur. The highest probability of a collision occurs at the moment in time that is just after the medium becomes free following a busy medium, because multiple stations are waiting for the medium to become available. Therefore, a random backoff arrangement is used to resolve medium contention conflicts. Basic CSMA/CA medium access control scheme behavior is shown in FIG. 1. IFS stands for Inter Frame Spacing.

However, the MAC cannot always prevent the occurrence of co-channel transmissions that overlap in time due to position dependent receive level variations or limited margins with respect to the carrier sense/defer threshold.

Briefly stated, a receiver for a station in a wireless local area network using a common wireless communication channel and employing a CSMA/CA (carrier sense multiple access with collision avoidance) protocol includes various modes. In normal mode, the receiver follows typical states in order to detect a message and demodulate data from the message properly. Meanwhile, a process implements a message-in-message (MIM) mode when an energy increase above a specified level is detected. While in the MIM mode, if a carrier is detected, the energy increase is caused by a new message; otherwise, the energy increase is caused by an interfering station. If the carrier is detected, the receiver begins retraining so that it can start receiving the new message as soon as the first message ends. If no carrier is detected, the receiver waits a specified time to detect a carrier or for the end of the first message, after which the receiver returns to the beginning of the normal mode. While in the normal mode, if a message is detected that is not addressed to the station, the receiver enters a hunt mode. While in the hunt mode, the receiver waits for the current message to finish. At the same time, a process implements retraining when both an energy increase above a specified level and a carrier are detected. If no carrier is detected within a specified time, or if the energy level decreases below the specified level, the receiver returns to the beginning of the normal mode.

FIG. 1 shows basic CSMA/CA behavior of a transceiver in a wireless LAN.

FIG. 2 shows a variation of receive levels vs. distance characterized by exponential path loss for typical indoor environments.

FIG. 3A shows an illustration of medium reuse distance.

FIG. 3B shows an illustration of worst case interference distance for cellular telephone systems.

FIG. 3C shows an illustration of worst case interference distance for a wireless LAN.

FIG. 4 shows a basic block diagram of a DSSS transceiver.

FIG. 5A shows a correlator output at a single symbol (solid line) and successive symbols (dashed line).

FIG. 5B shows a correlator output with desired signal contribution (solid line) and interferor signal contribution (dashed line).

FIG. 5C shows a correlator output at a significant channel degradation (solid line) and at an ideal channel (dashed line).

FIG. 6A shows receive levels (solid lines) around access points at positions 0 and 80 meters and stations at 20 meters from the access points and reference levels (dashed lines) for a 6 dB and a 10 dB margin with respect to the signal from the access points.

FIG. 6B shows receive levels (solid lines) around access points at positions 0 and 40 meters and stations at 20 meters and 10 meters from the access points in the presence of a 10 dB wall loss.

FIG. 7 shows a receiver state machine according to an embodiment of the present invention.

FIG. 8 shows a slot diagram of a CDA (Carrier Detect Active) State of the receiver state machine of FIG. 7 when an AGC is not fully settled.

FIG. 9 shows a slot diagram of a MIM (Message in Message) State of the receiver state machine of FIG. 7.

FIG. 10 shows a slot diagram of a HUNT State of the receiver state machine of FIG. 7.

The performance of transceiver systems is normally characterized by limitations in relation to noise and to different kinds of interference, such as intersymbol interference (ISI), adjacent-channel interference, and co-channel interference. The noise limitation relates to the power budget parameters such as transmitter output power, antenna gain, isotropic loss, path loss including multipath fading, man-made noise, receiver degradation (noise factor and implementation loss) and the required SNR (signal to noise ratio) for the modulation in question. Intersymbol interference is caused by the impulse response of the air-channel and partially by imperfections in the transmitter and receiver circuitry (filtering). Adjacent-channel interference is related to filtering and channel shaping conditions such as the spectrum of modulated signal. At non-constant envelope modulation, sideband regeneration by non-linearity in the transmitter power amplifier occurs. Co-channel interference relates to medium reuse conditions. The capture effect properties in relation to the desired and unwanted signal are crucial for the medium reuse.

Indoor propagation is analyzed using path loss based on distance because of simplicity. However, for cell planning and the installation of access points the ray tracing approach is very useful for the prediction of the path loss between access points. The formula below illustrates the various path loss contributions in an indoor environment. In addition to path loss caused by distance, large-scale variations and small-scale fluctuations occur in a multipath fading environment. ##EQU1## where L0 =antenna gain/loss (for dipole -2 dB), λ=wavelength, dref =reference distance from transmitter, d=transmitter-receiver distance, γ0 =decay exponent below dref (up to 5 or 10 meter γ0 =2), γ=decay exponent above dref, NIF =number of floors of the i'th category, LIF =loss due to i'th floor category, NjW =number of walls of j'th category, LjW =loss due to j'th wall category, and g=(linear) decay rate.

The second term of the above formula gives the isotropic loss with respect to the reference distance. At 2.4 GHz this loss with respect to 1 meter is 40 dB. The third term is the exponential path loss term; common decay exponents for indoor environments are 2 through 6, meaning 6 dB through 18 dB loss per distance doubling. The value of the decay exponent also depends on taking other loss terms into account. The fourth term characterizes loss by floors. The fifth term characterizes loss by walls. The sixth term gives a loss that is linear with respect to distance with common values for this indoor loss at from 0.2-0.6 dB/m in combination with the decay exponent equal to the decay exponent for free space propagation (γ=2).

FIG. 2 shows the variation of receive levels vs. distance, which is characterized by an exponential path loss for typical indoor environments such as an office, warehouse, or supermarket. The transmit power level is here 17 dBm and the isotropic loss (with respect to 1 meter) is 40 dB.

Referring to FIG. 3A, an illustration of medium reuse distance is shown. Cells are shown as hexagons with a radius R. A distance D is the distance between the cell base stations being examined for interference. When neighbor cell systems use different channels, then network cell systems that are further away can reuse the same channel again as long as interference from the further away cell systems is limited. If reuse of the same channel is allowed within another cell at distance D, then the co-channel reduction factor a=(D/R) is used as a key parameter dealing with co-channel interference.

Referring to FIG. 3B, a worst case interference distance for cellular telephone systems is shown. Separate channels are used for the uplink and downlink. The co-channel interference contributions from neighbor cells are permanently present. Since there are separate channels for the uplink and the downlink, the co-channel interference contributions are either all based on uplink or all based on downlink. For analog FM cellular systems, it is usually assumed that the combined co-channel interference from six neighbor cells may not exceed a CSIR (co-channel signal to interference ratio) of 18 dB. Furthermore, it is also usually assumed that the total of the six contributions corresponds to six times the average case contribution based on the co-channel reduction factor a=(D/R). The MRE (medium reuse efficiency) is defined as the cell area over the area assigned for a single channel. This implies that ##EQU2## based on a CSIR=18 dB.

Significant differences exist between cellular telephone systems as discussed above and indoor wireless LANs. LAN considerations include requirements for throughput/delay characteristics, packet error rate, and fairness. In addition, LANs are applied in an environment with burst-type traffic where one station gets the whole "bandwidth".

The number of installed access points for indoor wireless LANs has to be as low as possible to save infrastructure cost consistent with guaranteeing the required fairness and throughput/delay performance at peak-load. With indoor wireless LANs, only one channel is used for both uplink and downlink transmissions. This single channel structure, as well as the packet switching nature of this type of LAN, implies that the co-channel interference scenario is different from that of cellular telephone systems.

In particular, the difference between wireless LANs based on IEEE 802.11 DSSS (direct sequence spread spectrum) and DS/CDMA (direct sequence/code division multiple access) systems is fundamental. With DS/CDMA systems, the different codes provide sufficient separation between individual links which share the same band as long as the receive levels don't diverge too much. With indoor wireless LANs, the maximum level of interference present during the transmission of a frame is dominated by the interference from one neighbor cell station. Such a neighbor cell interference potentially is present for a short period, as occurs at the transmission of an acknowledgement frame (ACK). The IEEE 802.11 CSMA/CA control technique does not apply an individual carrier sensing before an ACK is transmitted.

Referring to FIG. 3C, the worst case interference distance for wireless LANs is shown, assuming the same channel is used for the uplink and downlink. The worst case distance scenario, where one interferer dominates, gives a CSIR requirement with ##EQU3## which leads to an MRE (medium reuse efficiency) of ##EQU4##

The duration of a worst interference presence is less relevant, because when the received frame is mutilated, the number of erroneous bits does not matter. For transmitting data packets, the target FER (frame error rate) has to be better than 10-2 during transmission of 1 Kbyte packets. This FER requirement is in contrast to the requirement for cellular telephone systems where the BER (bit error rate) has to be better than 10-3. For an IEEE 802.11 DSSS receiver, a detection margin with regard to noise corresponds to a BER better than 10-6. However, the capture effect properties of an IEEE 802.11 DSSS receiver do not correspond to the detector margins used with respect to noise.

The IEEE 802.11 DSSS is based on the following 11-chip Barker sequence +1, -1, +1, +1, -1, +1, +1, +1, -1, -1, -1. This sequence is used as a PN (pseudo sequence and the symbol duration corresponds to the duration of the 11-chips. The 11-chips spreading makes the occupied bandwidth larger. The DSSS spreading increases the effective bandwidth from 1 MHz to 11 MHz. At the same time, the 11-chips spreading reduces the impact of multipath fading. With an indoor channel having a delay spread of 100 ns and selecting one out of two antennas, the fading margin required for an outage of 1% is reduced to 4 dB, whereas the required fading margin would be 9 dB for a 1 MHz system.

Referring to FIG. 4, a basic block diagram of a DSSS transceiver is shown. The transmitter section includes an encoder, a spreader, and a transmitter front-end. The receiver section includes a receiver front-end, a correlator, and a detector decoder.

Referring to FIG. 5A, the receiver correlator output spike waveform is shown for the ideal case, i.e., an air-channel with no degradation by filtering. The output at a single symbol is shown as a solid line. The output for successive symbols is shown as a dashed line.

Referring to FIG. 5B, the receiver correlator output spike waveform is shown which demonstrates the presence of a co-channel interferor. The correlator output with the desired signal contribution is shown as a solid line, whereas the interferer signal contribution is shown with a dashed line. In the most likely case, the spike waveform contribution from the interferer falls between the spike-waveform peaks of the desired signal. A clock drift of X ppm (i.e., the difference between the clocks in the desired signal transmitter and the clocks in the interferor transmitter) corresponds to a shift-in-time of 5X ns for a typical packet transmission time of 5 ms. X has a maximum of a few tens (ppm) for low cost clock circuitry. Therefore, it is unlikely that the interferor spike-waveform peak will shift during a packet transmission time to a position-in-time with overlapping spike-waveform peaks.

Referring to FIG. 5C, a degradation due to a channel which introduces delay spread is shown. The correlator output at significant channel degradation is shown as a solid line, whereas the correlator output of an ideal channel is shown as a dashed line. An allowed margin with regard to the interferor level and clock drift decreases with an increase in delay spread. Imposing more severe requirements for the clock circuitry benefits the MRE (medium reuse efficiency), since the probability of non-overlap for the peaks during the full reception of a frame increases. However, the most threatening situation is introduced by the acknowledgment mechanism. For transmission of an acknowledgement frame (ACK), there is no individual carrier sensing applied, resulting in increased risk of strong interference. The shift-in-time during the 250 μs period during which an ACK interferes is only 0.25X ns. This 0.25X ns shift-in-time is, for typical values of X (a few tens ppm), very small compared to the 1 μs between two successive symbol-peaks in the spike-waveform.

IEEE 802.11 DSSS specifies twelve channel frequencies in the 2.4 GHz band. However, there are only a few non-overlapping channels that can operate simultaneously without interfering each other. The allowed CSIR and ASIR (adjacent channel signal-to-interference ratio) depend on the particular transceiver implementation. In addition, the CRS (carrier sense) function is important for proper CSMA/CA behavior. The medium busy (MBUSY) state occurs when the receive level is above the CRS threshold. IEEE 802.11 DSSS describes an upper limit for the CRS threshold which is dependent on the applied transmit power. For a transmit power of 17 dBm (50 mW) or below, this threshold is -70 dBm. For higher transmit power, one of the lower (more sensitive) thresholds must be applied. U.S. Pat. No. 5,553,316 (Power Control Method in a Wireless Communication System) details a method of determining a transmit power level and its associated CRS threshold level.

Referring to FIGS. 6A-6B, receive levels for a scenario with an exponential path loss of γ=3.5 (10.5 dB/octave) for distances above 10 meters are shown. At a CRS threshold of -75 dBm, the transmissions from the access points at 0 and 80 meters are received well by the stations within a 20 meter distance when the required CSIR is 10 dB or less. In FIG. 6A, an ACK is returned from the station at 20 meters towards the access point at 0 meters which does not disturb an ongoing transmission by the access point at 80 meters to the station at 60 meters in the neighbor cell.

More sensitive CRS thresholds can be applied for larger cell sizes adapted according to the exponential path loss which result in a figure with the same form as shown in FIG. 6A. So, too, less sensitive CRS thresholds can be applied for smaller cell sizes adapted according to the exponential path loss which also result in a figure with the same form as shown in FIG. 6A. In FIG. 6B, a 10 dB wall loss is between the two neighbor cells. In this situation, the ACK from the station at 30 meters towards the access point at 40 meters disturbs the reception of the transmission from the access point at 0 meters by the station at 20 meters.

The applied CRS threshold leads to a distinction between "sharing" and "reuse". All stations (and access points) around an actively transmitting station (or access point) measure the receive level of the DSSS signal. When the receive level is above the CRS threshold, such a station cannot start a transmission and has to defer the packet transmission. Such deferments are not coupled to the cell boundaries. If we look at FIG. 6A, transmissions around the access points at 0 and 80 meters start independently for a cell size radius of 20 meters and a CSIR around 8 dB. At a smaller distance between the access points, the medium is shared frequently. In FIG. 6B, we see the impact of disturbed symmetry, which gives some risk of errors for stations at one edge of the cell around the access point at 0 meters.

The optimum CRS threshold is dependent on the target receive level at the edge of the cell, the required CSIR, and path loss conditions (path loss coefficient γ, multipath fading), packet traffic (type of offered load, mixture of packet sizes), and performance criteria (throughput, tolerable transmission delay).

IEEE 802.11 DSSS specifies bit rates of 1 and 2 Mbits/s. The allowable SNR and CSIR values for reliable transmission of data packets are dependent on the bit rate. The transceiver performance with regard to SNR and CSIR are dependent on the implementation and presence of various signal processing functions such as differential or coherent detection, channel matched filtering, system noise, and processing accuracy. When the transceiver implementation is based on enhanced signal processing with phase correction and frequency offset compensation (coherent detection) and channel matched filtering, then the system degradation that occurs at indoor channels with typical delay spread can be approximated at 1-2 dB with respect to the theoretical BER vs. SNR curves.

For IEEE 802.11 DSSS, we distinguish between two types of capture effects. The required CSIR depends on which signal arrives first: the desired one or the interfering one. A capture ratio (or CSIR) of 2 to 3 dB for the situation at which an interfering signal arrives during the desired transmission is feasible. If the desired signal arrives later than the interferor signal, a higher capture ratio is required to let the receiver retrain well.

As shown in FIG. 6A for a path loss coefficient γ=3.5, the combination of a transmit power level of 17 dBm and a CRS threshold of -75 dBm yields reliable operation at distances up to 20 meters for required CSIRs of 10 dB or better (i.e., more robust), at distances up to 24 meters for CSIRs of 6 dB or better, and at distances up to 30 meters for ideal capture properties (CSIR=0 dB). Referring momentarily to FIG. 5B, the arrival of an interferer which produces a spike-waveform peak that falls between successive spike-waveform peaks of the desired signal does not harm the desired signal reception as long as this interference signal strength meets the required CSIR. The transceiver design is optionally optimized for robustness against co-channel interference with regard to the desired signal spike-waveform tracking. Such a robustness is preferable in relation to interference by transmission of ACKs having a short duration and no individual CRS function. In theory, the later arriving interferor could be even stronger.

IEEE 802.11 DSSS specifies BPSK and QPSK. In addition, proprietary modes with M-PSK and QAM schemes can be applied that provide higher bit rates by encoding more bits per symbol. A transceiver implementation for such modulation schemes yields SNR performance figures which are a few dB worse than what the theoretical curves show. Because of the nature of DSSS, these higher bit rates also provide good capture effect properties in co-channel interference scenarios as described above with respect to FIGS. 6A-6B. An automatic rate selection scheme based on the reliability of the individual uplink and downlink can optionally be applied. An example of a basic rate adaptation scheme is that after unacknowledged packet transmissions, the rate falls back, and after a specified number (e.g., 10) of successive correctly acknowledged packet transmissions, the bit rate goes up.

The transmissions from the access point in the center of a cell to a station in the outer part are the most sensitive to co-channel interference from a neighbor cell. For path loss that corresponds fully to the exponential curves as in FIG. 6A, the applied CRS threshold yields enclosed areas for which a certain CSIR is expected. In practice, the presence of multipath fading and hard walls disturb the ideal case curves.

When two access points don't receive each other above the CRS threshold, they are allowed to transmit at the same time. In this case, the required CSIRs that depend on the applied bit rates are very relevant. The occurrences of the various CSIR situations depend on the network load in the neighbor cells. The capture effect robustness and the traffic process permit accommodation to the bit rate used for the uplink and downlink. At lower loads in the neighbor cells, the highest bit rate can be used more often. At higher loads, the transmissions from the access point to stations at the outer part of the cells is often done at fallback rates due to the mutilation of transmissions by interference. In practice, the network load for LANs with modern client-server applications includes a majority of burst-type traffic characterized by transmission bursts over individual links with low activity during most of the time. Therefore, the higher bit rate is preferably used most of the time, while with high loads in the neighbor cells, as evoked by test applications, the system switches to lower rates in the outer part of the cell.

Only a few independent DSSS channels are available in the 2.4 GHz ISM band for simultaneous operation. Therefore, some strategy must be followed to obtain a good medium reuse figure per channel. Two such strategies are (1) establishing a CRS threshold based on the cell size and required CSIR; and (2) using a fixed CRS threshold.

The MRE and required CSIR derived from the formulas described above for indoor wireless LANs are optionally applied at a high density of access points and small cells. However, such an application potentially implies a CRS threshold that is above the IEEE 802.11 DSSS limit of -70 dBm or a transmit power level that is below 17 dBm, because otherwise the CRS threshold would be the limiting element. In a fully filled two-dimensional space (i.e., a large multi-cell area), the bit rate of 2 Mbit/s and a minimum required CSIR of 3 dB result in a throughput density of 0.2 Mbit/s per cell per channel. An automatic rate selection scheme combined with additional bit rates of 3 or 4 Mbit/s produces higher rate operation in the inner cell part as well as during the period that no significant co-channel interference exists. Such an automatic rate selection allows a throughput density of 0.3 Mbit/s per cell per channel.

When a CRS threshold of -70 dBm and a transmit power of 17 dBm are applied, the addition of more access points with smaller cells causes sharing between nearby neighbor cells defined as less than 60 meters at γ=3.5. Stations therefore associate with a closer access point, while the interference from further away cells becomes relatively lower (i.e., better actual CSIRs). Therefore, a higher bit rate can be used in the outer parts of a cell, but only a single transmission activity can exist within a radius of 60 meters (0.94 hectare). A throughput density of 4 Mbit/s per hectare per channel is possible at the proprietary bit rates of 3 and 4 Mbit/s, in addition to the basic bit rates of 1 and 2 Mbitls, when coupled with automatic rate selection. In practice, the presence of obstructions such as concrete walls and floors provides additional isolation.

Based on the above discussion, a CRS threshold based on both the target receive level at the cell edge and the required CSIR is preferable for optimum medium reuse in a typical indoor environment. The DSSS signal constellation provides very advantageous capture effect properties which can be exploited by a dedicated design with respect to ACKs in a neighbor cell. A high access point density is needed for realization of a high throughput density. An automatic rate selection can be combined with the application of proprietary bit rates of 3 and 4 Mbit/s as well as the basic 1 and 2 Mbitls. Automatic rate selection provides fall-forward when reliable connections exist and fall-back in the presence of strong co-channel interference. Automatic rate selection provides dynamic adaptation of bit rate to interference depending on positions and load. Without the limitations prescribed by IEEE 802.11 for CRS threshold and transmit power level, a contribution to the throughput density of 0.3 Mbit/s per cell for each available channel is possible in a large multi-cell environment.

For PCMCIA based wireless LAN cards, a typical transmit power level is 17 dBm. At this transmit power level, IEEE 802.11 DSSS prescribes a CRS threshold of -70 dBm or lower. A throughput density up to 4 Mbit/s per hectare per channel is possible with these settings when coupled with a high density of access points. A lower CRS threshold is preferable with a lower density of access points and cell sizes having a radius of more than 20 meters. This lower CRS threshold depends on the path loss coefficient and the required CSIRs for the supported bit rates.

Referring to FIG. 7, a state machine 10 defines how an embodiment of a receiver for a station on a wireless LAN according to the present invention reacts to input data in normal receive mode, message in message mode, and message in a message hunt mode. Detailed internal control signals are not given.

In normal receive mode ("Normal Mode"), when a first received transmission contains a matching destination address (contained in the MAC header field) signifying that the station is the intended recipient, or when the address of the received transmission has not been decoded, the receiving station continues with processing the communication until the communication is fully received or until a second received transmission exceeding a specified threshold level arrives. Upon arrival of the second transmission which exceeds the specified receive level increase threshold, the receiver transitions to the message in message mode ("MIM Mode"). The receiver is incapable of handling the first received transmission without bit errors during the arrival of the second received transmission.

When the first received transmission does not contain a matching destination address, the station watches for an increase of the receive level above the specified threshold level which indicates a potential message addressed to the station. The receiver enters the message in message hunt mode ("HUNT Mode"). When such a receive level increase above the specified threshold occurs, the receiver begins retraining to automatically focus on the strongest received transmission. This strongest received transmission is received correctly only if the minimum required capture ratio is met.

In Normal Mode, the receiver follows the typical states in order to demodulate the received data properly. Meanwhile, a process is watching the energy level indicator and triggers the MIM Mode when a jump in energy is detected. In HUNT Mode, the receiver is in an idle state waiting for the current message to finish. At the same time, a process is watching the energy level indicator and triggers the Hunt Mode Training State when an energy jump is detected.

The thresholds for receive level increase in MIM Mode and HUNT Mode are based on the capture properties of a receiving station. The threshold for a jump in the MIM Mode (MIMDLVL) is based on the capability of a receiver to continue reliable data detection for a first transmission after being trained well, although a second transmission which starts later will interfere. The threshold for a jump in the HUNT mode (HUNTDLVL) is based on the capability of a receiver to train well and make reliable data detection for a second starting transmission, even when a first started transmission, which is not relevant for the receiver in question, continues to be present and gives background interference all the time.

The following is a description of the states CDI, CDA, AS1, AS2, TRAIN, HEAD, DATA, WIFS, MIM, HUNT, HAS1, and HAS2 of state machine 10. A slot counter `sc` (not shown) is maintained parallel to receiver state machine 10. The slot counter counts from 0 to 19 and is incremented once per symbol interval (one μs).

CDI (Carrier Detect Inactive) State

In this state, the receiver is more or less idle. The carrier detector is disabled. The AGC is inactive. This state is passed during 5 symbol intervals to allow various delays such as transmitter power stage rampup and MAC decision.

CDA (Carrier Detect Active) State

In this state, the carrier detector and AGC are active. At the end of the slot (slot counter=19) the next state is determined by the status of the carrier detector and AGC. The carrier is detected when the DSSS modem signal is present which is recognized by the carrier detection circuitry and the energy level as measured by the AGC exceeds the carrier detect threshold. When no carrier is detected, the energy levels of the current and the previous slot are stored. This information can be used to determine the silence level.

When a carrier is detected but the AGC is not fully settled (inrange is `0`), the energy measurement in this slot is not valid.

Referring to FIG. 8, when a carrier is detected and the AGC is settled (inrange is `1`), the energy measurement in this slot is reliable enough to use. This slot is used as the first antenna selection slot for choosing one out of two antennae. The AGC setting and energy level are stored.

When a carrier is detected and the energy level is above the defer threshold, MBUSY is put on.

AS1 (Antenna Select 1) State

In this state, the energy level of the current antenna is measured. At the end of the slot the other antenna is selected and the state machine jumps to the second antenna select state AS2.

AS2 (Antenna Select 2) State

In this state, the energy level of the current antenna is measured. At the end of the slot the antenna with the highest signal level is selected, and the state machine jumps to the receiver training state (TRAIN). At the end of this AS2 state, the signal levels and AGC settings for both antennae are stored.

TRAIN (Receiver Training) State

In this state, the receiver digital processing circuitry core is trained, the AGC is fixed, and energy level measurements continue. After the receiver digital signal processing circuitry for symbol timing, frequency offset compensation, and channel estimation are trained, the data detection is sufficiently reliable. The first part of the IEEE 802.11 DSSS frame header which contains the SFD (start frame delimiter) can be expected between 48 μs and 124 μs after the antenna selection is completed. The unknown moment (with respect to the local antenna slotting) at which the remote station starts transmission of the fixed format of the IEEE 802.11 DSSS preamble/header, along with the possibility that one antenna gets a very low signal due to fading, give this margin-in-time for the moment at which the SFD can be expected.

On detection of the SFD, the state machine jumps to state HEAD. When the SFD is not detected in the `SFD detection window`, the state machine jumps to state HUNT. When the LENGTH field can not be determined, the receiver uses the value `MaxLength`. If, in this state, the energy level increases more than a `message in message delta level` (MIMDLVL), the receiver assumes it is another message and jumps to the MIM state. In an alternative embodiment, the received data are stored in the call sign buffer until the SFD detection.

The energy level of the incoming message is updated in the register signal-- level-- selected every slot. Bit `HuntMode` is kept reset until the DATA phase.

State Transitions:

1. Condition: SFD detected

Actions: PDA on,

receive clock at 1 MHz

goto state HEAD.

2. Condition: SFD window passed

Actions: cnt:=MaxLength (protection timer)

goto state HUNT.

3. Condition: end of slot and energy level>signal-- level-- 1+MIMDLVL

Actions: enable carrier detector and AGC,

goto state MIM.

HEAD (IEEE header) State

In this state, the IEEE 802.11 DSSS header is processed. The receiver clock is preferably at 1 MHz. The CRC checker is enabled. The CRC shift register is preset to all ones. The first 8 bits after SFD are the SIGNAL field. The SIGNAL field is used to determine the rate of the data part of the message. Valid values are 0Ah=1 Mbit/s and 14h=2 Mbit/s. The next 8 bits (SERVICE field) are not used. The following 16 bits, the LENGTH field, are stored. The value of LENGTH indicates the length of the message in microseconds (μs).

The SIGNAL, SERVICE, and LENGTH fields are processed by the CRC checker using the polynomial X16 +X12 +X5 +1. The result is compared with the last 16 bits of the IEEE 802.11 DSSS header. When the header is valid, the receiver switches the receive clock to the rate determined by the SIGNAL field. If a non-valid header is received (e.g., wrong CRC or SIGNAL field out of spec), the receiver jumps to the HUNT state.

If the energy level increases more than the `message in message delta level,` (MIMDLVL), the receiver assumes it is another message and jumps to the MIM state.

State Transitions:

1. Condition: end of header and wrong CRC or SIGNAL field not (0Ah or 14h)

Actions: PDA off, receive clock off, receive data `0`

goto state HUNT.

2. Condition: end of header and correct CRC

Actions: if SIGNAL=14h then

data rate is 2 Mbit/s

else

data rate is 1 Mbit/s

end if,

keep LENGTH,

goto state DATA.

3. Condition: end of slot energy level>signal-- level-- 1+MIMDLVL

Actions: PDA off, receive clock off, receive data `0`,

enable carrier detector and AGC,

goto state MIM.

DATA (data phase) State

In this state, the data (MPDU) is received. The receiver is transparent to the data because it does not use it. The length of this state is determined by the value of `LENGTH`. Every microsecond (μs), a counter is incremented until it reaches LENGTH, thereby signaling the end of the message. If, in this state, the energy level increases more than the `message in message delta level` (MIMDLVL), the receiver assumes it is another message and therefore then jumps to the MIM state. The MAC controller uses the address information of the source and destination stations. When the MAC determines that the destination address (which could be a group address) does not match with (its own) the address of the receiving station, the MAC supplies a command to the transceiver to go into `HuntMode.` Note that the bit `HuntMode` can only be set in this state. In the data phase state, the end of message is determined by the LENGTH field only, and not by carrier loss or energy drop.

State Transitions:

1. Condition: cnt=LENGTH

Actions: PDA off, receive clock off, receive data `0`,

cnt:=0,

goto state WIFS.

2. Condition: HuntMode=

Actions: PDA off, receive clock off, receive data `0`,

goto state HUNT.

3. Condition: end of slot and energy level>signal-- level-- 1+MIMDLVL

Actions: PDA off, receive clock off, receive data `0`,

enable carrier detector and AGC,

goto state MIM.

WIFS (Wait short Inter Frame Space) State

This state is a wait state between two messages. At the end of this state, the slotting system is reset such that all stations which receive the transmission in question restart their slotting in synchronization. The state machine jumps to the CDI state ready for the next message. A counter is incremented every microsecond (μs) until it reaches the parameter `SIFS`.

MIM (Message In a Message) State

This state is reached after the state machine detects an energy increase on the selected antenna, whether caused by another message or an interferor. Referring to FIG. 9, after detection of the energy increase, the receiver measures the energy level and the carrier detect status at the selected antenna in the next slot. If a carrier signal is detected, then the increase in energy level is from a second message. The state machine again does antenna selection followed by retraining on the new situation. The current slot is used as the first antenna selection slot, the AGC setting and the energy level are stored, and the state machine jumps to AS2 for the second antenna selection slot. MBUSY stays on.

If there is no carrier signal detected, then the level increase is caused by an interferor. The receiver stays in this state until either a carrier is detected or until the end of the first message. When the CRC of the first message is correct, the end of the first message is determined by the message length counter (cnt). The state machine then jumps to the WIFS state. When the CRC of the first message is wrong or when the SFD is not detected within the time window, the state machine goes back to the CDI state either after the energy level drops below the defer threshold or until the message length counter expires (length has been set to its maximum in this case). Under this last condition, MBUSY stays on, and in every slot, the other antenna is selected for validation if another message does not arrive before the message length counter expires.

State Transitions:

1. Condition: end of slot and carrier detected

Actions: disable carrier detector,

AGC-- unselected:=current AGG setting,

signal-- level-- unselected:=energy level,

select other antenna,

goto state AS2.

Note that the AGC signal `inrange` is not used.

2. Condition: CRC correct and cnt=LENGTH

Actions: MBUSY off,

goto state WIFS

3. Condition: CRC wrong and (energy level<defer threshold or cnt=MaxLength)

Actions: MBUSY off,

goto state CIDI

HUNT (Message in a Message Hunt Mode) State

In this state, the receiver waits for an energy increase on one of the two antennae. The antenna with the highest delta level is used to receive the message. The AGC stays fixed.

Referring to FIG. 10, at the end of a slot, the current energy level is stored and the new delta level (the current level minus the level of two slots ago) is determined. It is assumed that another message is being received when the delta level is higher than HUNTDLVL and the carrier is detected. The next two slots are used to determine which antenna has the highest delta level. When the energy level increase does not occur or when the increase occurs but no carrier is detected (i.e., due to an interferor), the receiver jumps to state WIFS when the message length counter expires in case the CRC of the first message is correct. When the CRC is wrong or when the SFD is not detected, the state machine returns to the CDI state either after the energy level drops below the defer threshold or until the message length counter expires (the length is set to max. in this case).

At the end of each slot, the signal levels of the current and previous slots are updated and the other antenna is selected.

State Transitions:

1. Condition: end of slot and carrier detected and current energy level-signal-- level-- 2-- slots-- ago>HUNTDLVL

Actions: enable AGC,

goto state HAS 1

2. Condition: CRC correct and cnt=LENGTH

Actions: MBUSY off,

goto state WIFS

3. Condition: CRC wrong and [(energy level<defer threshold) or (cnt=MaxLength)]

Actions: MBUSY off,

goto state CDI

HAS1 (Hunt mode Antenna Select 1) State

In this state, the delta energy level at the current antenna is measured. At the end of the slot, the other antenna is selected and the state machine jumps to state HAS2, the second hunt mode antenna select.

HAS2 (Hunt mode Antenna Select 2) State

In this state the delta energy level of the current antenna is measured. At the end of the slot, the antenna with the highest signal level is selected, and the state machine jumps to the training state.

It is to be understood that the embodiments of the invention herein described are merely illustrative of the application of the principles of the invention. Reference herein to details of the illustrated embodiments are not intended to limit the scope of the claims, which themselves recite those features regarded as essential to the invention.

Kamerman, Adriaan, Boer, Jan, Kopmeiners, Robert John, Diepstraten, Wilhelmus Josephus, van Bokhorst, Hendrik, van Driest, Hans, Mud, Rienk

Patent Priority Assignee Title
10608759, Mar 31 2017 Continental Automotive France; Continental Automotive GmbH Method and sensor for detecting the presence of co-channel jamming
11742893, Apr 11 2017 FRAUNHOFER-GESELLSCHAFT ZUR FÖRDERUNG DER ANGEWANDTEN FORSCHUNG E V Specific hopping patterns for telegram splitting
6272353, Aug 20 1999 NOKIA SOLUTIONS AND NETWORKS US LLC Method and system for mobile communications
6480721, Jul 10 1998 Siemens Aktiengesellschaft Method and system for avoiding bad frequency subsets in a frequency hopping cordless telephone system
6560443, May 28 1999 Nokia Technologies Oy Antenna sharing switching circuitry for multi-transceiver mobile terminal and method therefor
6580981, Apr 16 2002 ARRIS ENTERPRISES LLC System and method for providing wireless telematics store and forward messaging for peer-to-peer and peer-to-peer-to-infrastructure a communication network
6617990, Mar 06 2002 Meshnetworks Digital-to-analog converter using pseudo-random sequences and a method for using the same
6674790, Jan 24 2002 ARRIS ENTERPRISES LLC System and method employing concatenated spreading sequences to provide data modulated spread signals having increased data rates with extended multi-path delay spread
6687259, Jun 05 2002 Google Technology Holdings LLC ARQ MAC for ad-hoc communication networks and a method for using the same
6728232, Mar 15 2002 ARRIS ENTERPRISES LLC System and method for auto-configuration and discovery of IP to MAC address mapping and gateway presence in wireless peer-to-peer ad-hoc routing networks
6728545, Nov 16 2001 ARRIS ENTERPRISES LLC System and method for computing the location of a mobile terminal in a wireless communications network
6744766, Jun 05 2002 Google Technology Holdings LLC Hybrid ARQ for a wireless Ad-Hoc network and a method for using the same
6754188, Sep 28 2001 ARRIS ENTERPRISES LLC System and method for enabling a node in an ad-hoc packet-switched wireless communications network to route packets based on packet content
6768730, Oct 11 2001 ARRIS ENTERPRISES LLC System and method for efficiently performing two-way ranging to determine the location of a wireless node in a communications network
6771666, Mar 15 2002 Google Technology Holdings LLC System and method for trans-medium address resolution on an ad-hoc network with at least one highly disconnected medium having multiple access points to other media
6807165, Nov 08 2000 ARRIS ENTERPRISES LLC Time division protocol for an ad-hoc, peer-to-peer radio network having coordinating channel access to shared parallel data channels with separate reservation channel
6845097, Nov 21 2001 FCO V CLO TRANSFEROR LLC Device, system, method and computer readable medium for pairing of devices in a short distance wireless network
6873839, Nov 13 2000 Strong Force IOT Portfolio 2016, LLC Prioritized-routing for an ad-hoc, peer-to-peer, mobile radio access system
6898204, Apr 07 2000 AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE LIMITED Method of determining a collision between a plurality of transmitting stations in a frame-based communications network
6904021, Mar 15 2002 ARRIS ENTERPRISES LLC System and method for providing adaptive control of transmit power and data rate in an ad-hoc communication network
6904275, Nov 13 2000 Strong Force IOT Portfolio 2016, LLC Prioritized-routing for an ad-hoc, peer-to-peer, mobile radio access system
6909878, Aug 20 2002 IXI MOBILE ISRAEL LTD Method, system and computer readable medium for providing an output signal having a theme to a device in a short distance wireless network
6937602, Oct 23 2001 Google Technology Holdings LLC System and method for providing a congestion optimized address resolution protocol for wireless ad-hoc networks
6957045, Oct 26 2001 IXI MOBILE ISRAEL LTD Device, system, computer readable medium and method for providing status information of devices in a short distance wireless network
6961575, Nov 13 2000 Strong Force IOT Portfolio 2016, LLC Ad Hoc peer-to-peer mobile radio access system interfaced to the PSTN and cellular networks
6967937, Dec 17 1999 AT&T MOBILITY II LLC Collision-free multiple access reservation scheme for multi-tone modulation links
6970444, May 13 2002 ARRIS ENTERPRISES LLC System and method for self propagating information in ad-hoc peer-to-peer networks
6982982, Oct 23 2001 ARRIS ENTERPRISES LLC System and method for providing a congestion optimized address resolution protocol for wireless ad-hoc networks
6987795, Apr 08 2002 MeshNetworks, Inc. System and method for selecting spreading codes based on multipath delay profile estimation for wireless transceivers in a communication network
6990117, Nov 24 1999 Denso Corporation CSMA wireless LAN having antenna device and terminal station
7013112, Dec 18 2001 FCO V CLO TRANSFEROR LLC Method, system and computer readable medium for making a business decision in response to information from a short distance wireless network
7016306, May 16 2002 ARRIS ENTERPRISES LLC System and method for performing multiple network routing and provisioning in overlapping wireless deployments
7016334, Aug 17 2001 FCO V CLO TRANSFEROR LLC Device, system, method and computer readable medium for fast recovery of IP address change
7016648, Dec 18 2001 FCO V CLO TRANSFEROR LLC Method, system and computer readable medium for downloading a software component to a device in a short distance wireless network
7027462, Jan 02 2001 AT&T Properties, LLC; AT&T INTELLECTUAL PROPERTY II, L P Random medium access methods with backoff adaptation to traffic
7039017, Dec 28 2001 Texas Instruments Incorporated System and method for detecting and locating interferers in a wireless communication system
7039033, May 07 2001 FCO V CLO TRANSFEROR LLC System, device and computer readable medium for providing a managed wireless network using short-range radio signals
7042867, Jul 29 2002 ARRIS ENTERPRISES LLC System and method for determining physical location of a node in a wireless network during an authentication check of the node
7046962, Jul 18 2002 ARRIS ENTERPRISES LLC System and method for improving the quality of range measurement based upon historical data
7054126, Jun 05 2002 ARRIS ENTERPRISES LLC System and method for improving the accuracy of time of arrival measurements in a wireless ad-hoc communications network
7058018, Mar 06 2002 Google Technology Holdings LLC System and method for using per-packet receive signal strength indication and transmit power levels to compute path loss for a link for use in layer II routing in a wireless communication network
7061925, Jun 06 2003 Strong Force IOT Portfolio 2016, LLC System and method for decreasing latency in locating routes between nodes in a wireless communication network
7062703, Jul 28 2003 Cisco Technology, Inc Early detection of false start-of-packet triggers in a wireless network node
7072323, Aug 15 2001 RUCKUS IP HOLDINGS LLC System and method for performing soft handoff in a wireless data network
7072432, Jul 05 2002 ARRIS ENTERPRISES LLC System and method for correcting the clock drift and maintaining the synchronization of low quality clocks in wireless networks
7072618, Dec 21 2001 ARRIS ENTERPRISES LLC Adaptive threshold selection system and method for detection of a signal in the presence of interference
7072650, Nov 13 2000 Strong Force IOT Portfolio 2016, LLC Ad hoc peer-to-peer mobile radio access system interfaced to the PSTN and cellular networks
7075890, Jun 06 2003 RUCKUS IP HOLDINGS LLC System and method to provide fairness and service differentation in ad-hoc networks
7076259, Mar 13 2003 ARRIS ENTERPRISES LLC Real-time system and method for improving the accuracy of the computed location of mobile subscribers in a wireless ad-hoc network using a low speed central processing unit
7079509, Nov 08 2000 ARRIS ENTERPRISES LLC Time division protocol for an ad-hoc, peer-to-peer radio network having coordinating channel access to shared parallel data channels with separate reservation channel
7095754, Nov 03 2000 AT&T Properties, LLC; AT&T INTELLECTUAL PROPERTY II, L P Tiered contention multiple access (TCMA): a method for priority-based shared channel access
7099296, Nov 08 2000 ARRIS ENTERPRISES LLC Time division protocol for an ad-hoc, peer-to-peer radio network having coordinating channel access to shared parallel data channels with separate reservation channel
7106703, May 28 2002 ARRIS ENTERPRISES LLC System and method for controlling pipeline delays by adjusting the power levels at which nodes in an ad-hoc network transmit data packets
7106707, Dec 20 2001 ARRIS ENTERPRISES LLC System and method for performing code and frequency channel selection for combined CDMA/FDMA spread spectrum communication systems
7107498, Apr 16 2002 ARRIS ENTERPRISES LLC System and method for identifying and maintaining reliable infrastructure links using bit error rate data in an ad-hoc communication network
7116632, Jun 05 2003 ARRIS ENTERPRISES LLC System and method for determining synchronization point in OFDM modems for accurate time of flight measurement
7120457, Nov 27 1996 FIPA Frohwitter Intellectual Property AG Transmission control method and apparatus for mobile communication system
7126951, Jun 06 2003 ARRIS ENTERPRISES LLC System and method for identifying the floor number where a firefighter in need of help is located using received signal strength indicator and signal propagation time
7133391, Nov 08 2000 ARRIS ENTERPRISES LLC Time division protocol for an ad-hoc, peer-to-peer radio network having coordinating channel access to shared parallel data channels with separate reservation channel
7136361, Jul 05 2001 AT&T Properties, LLC; AT&T INTELLECTUAL PROPERTY II, L P Hybrid coordination function (HCF) access through tiered contention and overlapped wireless cell mitigation
7136587, Nov 15 2001 MeshNetworks, Inc. System and method for providing simulated hardware-in-the-loop testing of wireless communications networks
7142524, May 01 2002 ARRIS ENTERPRISES LLC System and method for using an ad-hoc routing algorithm based on activity detection in an ad-hoc network
7145903, Sep 06 2001 Strong Force IOT Portfolio 2016, LLC Multi-master bus architecture for system-on-chip designs
7149197, Aug 15 2001 ARRIS ENTERPRISES LLC Movable access points and repeaters for minimizing coverage and capacity constraints in a wireless communications network and a method for using the same
7151769, Mar 22 2001 Strong Force IOT Portfolio 2016, LLC Prioritized-routing for an ad-hoc, peer-to-peer, mobile radio access system based on battery-power levels and type of service
7167463, Oct 07 2004 ARRIS ENTERPRISES LLC System and method for creating a spectrum agile wireless multi-hopping network
7167680, Feb 05 2003 IXI MOBILE ISRAEL LTD Method, system and computer readable medium for adjusting output signals for a plurality of devices in a short distance wireless network responsive to a selected environment
7167715, May 17 2002 ARRIS ENTERPRISES LLC System and method for determining relative positioning in AD-HOC networks
7171220, Mar 14 2003 ARRIS ENTERPRISES LLC System and method for analyzing the precision of geo-location services in a wireless network terminal
7174161, Aug 12 2003 Kabushiki Kaisha Toshiba Radio communication apparatus and radio communication method
7180875, Dec 20 2001 Google Technology Holdings LLC System and method for performing macro-diversity selection and distribution of routes for routing data packets in Ad-Hoc networks
7180905, Nov 02 2001 AT&T Properties, LLC; AT&T INTELLECTUAL PROPERTY II, L P Access method for periodic contention-free sessions
7181214, Nov 13 2001 ARRIS ENTERPRISES LLC System and method for determining the measure of mobility of a subscriber device in an ad-hoc wireless network with fixed wireless routers and wide area network (WAN) access points
7190672, Dec 19 2001 Strong Force IOT Portfolio 2016, LLC System and method for using destination-directed spreading codes in a multi-channel metropolitan area wireless communications network
7197016, Nov 08 2000 ARRIS ENTERPRISES LLC Time division protocol for an ad-hoc, peer-to-peer radio network having coordinating channel access to shared parallel data channels with separate reservation channel
7200149, Apr 12 2002 ARRIS ENTERPRISES LLC System and method for identifying potential hidden node problems in multi-hop wireless ad-hoc networks for the purpose of avoiding such potentially problem nodes in route selection
7203497, Jun 06 2003 ARRIS ENTERPRISES LLC System and method for accurately computing the position of wireless devices inside high-rise buildings
7206294, Aug 15 2001 ARRIS ENTERPRISES LLC Movable access points and repeaters for minimizing coverage and capacity constraints in a wireless communications network and a method for using the same
7212504, Nov 08 2000 ARRIS ENTERPRISES LLC Time division protocol for an ad-hoc, peer-to-peer radio network having coordinating channel access to shared parallel data channels with separate reservation channel
7215638, Jun 19 2002 ARRIS ENTERPRISES LLC System and method to provide 911 access in voice over internet protocol systems without compromising network security
7215681, Sep 11 2002 HARRIS GLOBAL COMMUNICATIONS, INC Adaptive channel access for carrier sense multiple access based systems
7215966, Jun 05 2003 Strong Force IOT Portfolio 2016, LLC System and method for determining location of a device in a wireless communication network
7218628, Feb 07 2002 Mediatek Incorporation Method and device for detecting preamble of wireless data frame
7221686, Nov 30 2001 RUCKUS IP HOLDINGS LLC System and method for computing the signal propagation time and the clock correction for mobile stations in a wireless network
7245604, Nov 02 2001 AT&T Properties, LLC; AT&T INTELLECTUAL PROPERTY II, L P Fixed deterministic post-backoff for cyclic prioritized multiple access (CPMA) contention-free sessions
7245605, Nov 02 2001 AT&T Properties, LLC; AT&T INTELLECTUAL PROPERTY II, L P Preemptive packet for maintaining contiguity in cyclic prioritized multiple access (CPMA) contention-free sessions
7245725, May 17 2001 HUAWEI TECHNOLOGIES CO , LTD Dual processor framer
7248600, Nov 02 2001 AT&T Properties, LLC; AT&T INTELLECTUAL PROPERTY II, L P ‘Shield’: protecting high priority channel access attempts in overlapped wireless cells
7266104, Nov 08 2000 ARRIS ENTERPRISES LLC Time division protocol for an AD-HOC, peer-to-peer radio network having coordinating channel access to shared parallel data channels with separate reservation channel
7274708, Jan 02 2001 AT&T Properties, LLC; AT&T INTELLECTUAL PROPERTY II, L P Random medium access methods with backoff adaptation to traffic
7277413, Jul 05 2001 AT&T Properties, LLC; AT&T INTELLECTUAL PROPERTY II, L P Hybrid coordination function (HCF) access through tiered contention and overlapped wireless cell mitigation
7277415, Nov 02 2001 AT&T Properties, LLC; AT&T INTELLECTUAL PROPERTY II, L P Staggered startup for cyclic prioritized multiple access (CPMA) contention-free sessions
7280483, Jun 05 2003 Strong Force IOT Portfolio 2016, LLC System and method to improve the network performance of a wireless communications network by finding an optimal route between a source and a destination
7280517, Nov 02 2001 AT&T Properties, LLC; AT&T INTELLECTUAL PROPERTY II, L P Wireless LANs and neighborhood capture
7280545, Dec 20 2001 ARRIS ENTERPRISES LLC Complex adaptive routing system and method for a nodal communication network
7280555, Sep 25 2001 ARRIS ENTERPRISES LLC System and method employing algorithms and protocols for optimizing carrier sense multiple access (CSMA) protocols in wireless networks
7284268, May 16 2002 ARRIS ENTERPRISES LLC System and method for a routing device to securely share network data with a host utilizing a hardware firewall
7295532, Aug 17 2001 FCO V CLO TRANSFEROR LLC System, device and computer readable medium for providing networking services on a mobile device
7349380, Aug 15 2001 RUCKUS IP HOLDINGS LLC System and method for providing an addressing and proxy scheme for facilitating mobility of wireless nodes between wired access points on a core network of a communications network
7349441, Jun 06 2003 ARRIS ENTERPRISES LLC Method for optimizing communication within a wireless network
7356571, Oct 07 2002 IXI MOBILE ISRAEL LTD System, method and processor readable medium for downloading information within a predetermined period of time to a device in a network responsive to price selection
7366144, Mar 25 2002 AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE LIMITED Method of dynamically setting at least one threshold at an access point in a wireless local area network and the access point
7366901, Aug 01 2003 IXI MOBILE ISRAEL LTD Device, system, method and computer readable medium for identifying and authenticating a cellular device using a short-range radio address
7379432, Jul 05 2001 AT&T Properties, LLC; AT&T INTELLECTUAL PROPERTY II, L P Hybrid coordination function (HCF) access through tiered contention and overlapped wireless cell mitigation
7412241, Jun 06 2003 Strong Force IOT Portfolio 2016, LLC Method to provide a measure of link reliability to a routing protocol in an ad hoc wireless network
7415661, Jul 28 2003 Cisco Technology, Inc. Early detection of false start-of-packet triggers in a wireless network node
7421283, Nov 27 1996 FIPA Frohwitter Intellectual Property AG Transmission power control method and apparatus for mobile communication system
7522537, Jan 13 2003 Strong Force IOT Portfolio 2016, LLC System and method for providing connectivity between an intelligent access point and nodes in a wireless network
7551590, May 07 2001 FCO V CLO TRANSFEROR LLC Wireless device having a single processor in a short-range radio network
7558818, Jun 06 2003 Strong Force IOT Portfolio 2016, LLC System and method for characterizing the quality of a link in a wireless network
7570929, Jan 14 2000 Extreme Networks, Inc 802.11 networks using dynamic power control for RF transmission
7610027, Jun 05 2002 BISON PATENT LICENSING, LLC Method and apparatus to maintain specification absorption rate at a wireless node
7613458, Aug 28 2001 ARRIS ENTERPRISES LLC System and method for enabling a radio node to selectably function as a router in a wireless communications network
7634574, Jan 30 2003 Panasonic Intellectual Property Corporation of America Communication control device, communication terminal device, server device, and communication control method
7664132, Jan 02 2001 AT&T Properties, LLC; AT&T INTELLECTUAL PROPERTY II, L P Random medium access methods with backoff adaptation to traffic
7668102, Dec 13 2004 Intel Corporation Techniques to manage retransmissions in a wireless network
7697420, Apr 15 2002 ARRIS ENTERPRISES LLC System and method for leveraging network topology for enhanced security
7734809, Jun 05 2003 Strong Force IOT Portfolio 2016, LLC System and method to maximize channel utilization in a multi-channel wireless communication network
7756041, Jun 14 2001 Strong Force IOT Portfolio 2016, LLC Embedded routing algorithms under the internet protocol routing layer of a software architecture protocol stack in a mobile Ad-Hoc network
7773625, Nov 02 2001 AT&T Properties, LLC; AT&T INTELLECTUAL PROPERTY II, L P Access method for periodic contention-free sessions
7796570, Jul 12 2002 ARRIS ENTERPRISES LLC Method for sparse table accounting and dissemination from a mobile subscriber device in a wireless mobile ad-hoc network
7796573, Nov 08 2000 ARRIS ENTERPRISES LLC Terminal operating within an ad-hoc, peer-to-peer radio network
7849391, Jul 28 2003 Cisco Technology, Inc. Early detection of false start-of-packet triggers in a wireless network node
7852904, Dec 31 2003 Google Technology Holdings LLC Method and apparatus for reducing data collisions in a frequency hopping communication system
7864674, Nov 03 2000 AT&T Properties, LLC; AT&T INTELLECTUAL PROPERTY II, L P Tiered contention multiple access (TCMA): a method for priority-based shared channel access
7936854, Nov 15 2002 RPX Corporation Method and system of cycle slip framing in a deserializer
7983231, Nov 02 2001 AT&T Properties, LLC; AT&T INTELLECTUAL PROPERTY II, L P Staggered startup for cyclic prioritized multiple access (CPMA) contention-free sessions
7983232, Nov 02 2001 AT&T Properties, LLC; AT&T INTELLECTUAL PROPERTY II, L P Wireless LANs and neighborhood capture
7983271, Nov 03 2000 AT&T Properties, LLC; AT&T INTELLECTUAL PROPERTY II, L P Tiered contention multiple access (TCMA): a method for priority-based shared channel access
7995544, Nov 02 2001 AT&T Properties, LLC; AT&T INTELLECTUAL PROPERTY II, L P Wireless LANs and neighborhood capture
8064415, Nov 02 2001 AT&T Properties, LLC; AT&T INTELLECTUAL PROPERTY II, L P Fixed deterministic post-backoff for cyclic prioritized multiple access (CPMA) contention-free sessions
8068449, Oct 31 2006 AT&T Properties, LLC; AT&T INTELLECTUAL PROPERTY II, L P Hybrid coordination function (HCF) access through tiered contention and overlapped wireless cell mitigation
8068470, Nov 02 2001 AT&T Properties, LLC; AT&T INTELLECTUAL PROPERTY II, L P Preemptive packet for maintaining contiguity in cyclic prioritized multiple access (CPMA) contention-free sessions
8111608, Feb 17 2006 Sony Corporation Radio-communication device and radio-communication method
8111682, Nov 02 2001 AT&T Properties, LLC; AT&T INTELLECTUAL PROPERTY II, L P “Shield”: protecting high priority channel access attempts in overlapped wireless cells
8130770, Jul 05 2001 AT&T Properties, LLC; AT&T INTELLECTUAL PROPERTY II, L P Hybrid coordination function (HCF) access through tiered contention and overlapped wireless cell mitigation
8180351, Jun 29 2001 Strong Force IOT Portfolio 2016, LLC Ad-hoc peer-to-peer mobile radio access system interfaced to the PSTN and cellular networks
8238850, May 16 2005 LAPIS SEMICONDUCTOR CO , LTD Radio communication method and equipment
8325653, Jul 29 2002 ARRIS ENTERPRISES LLC System and method for restricting network access to one or more nodes in a wireless communications network
8532079, Nov 02 2001 AT&T Properties, LLC; AT&T INTELLECTUAL PROPERTY II, L P Preemptive packet for maintaining contiguity in cyclic prioritized multiple access (CPMA) contention-free sessions
8532134, Nov 03 2000 AT&T Properties, LLC; AT&T INTELLECTUAL PROPERTY II, L P Tiered contention multiple access (TCMA): a method for priority-based shared channel access
8649321, Jul 05 2001 AT&T Properties, LLC; AT&T INTELLECTUAL PROPERTY II, L P Hybrid coordination function (HCF) access through tiered contention and overlapped wireless cell mitigation
8687642, Jul 05 2001 AT&T Properties, LLC; AT&T INTELLECTUAL PROPERTY II, L P Hybrid coordination function (HCF) access through tiered contention and overlapped wireless cell mitigation
8699510, Nov 02 2001 AT&T Properties, LLC; AT&T INTELLECTUAL PROPERTY II, L P ‘Shield’: protecting high priority channel access attempts in overlapped wireless cells
8717245, Mar 16 2010 Olympus Corporation Planar multilayer high-gain ultra-wideband antenna
8913597, Nov 02 2001 AT&T Properties, LLC; AT&T INTELLECTUAL PROPERTY II, L P Fixed deterministic post-backoff for cyclic prioritized multiple access (CPMA) contention-free sessions
9179477, Jul 05 2001 AT&T Properties, LLC; AT&T INTELLECTUAL PROPERTY II, L P Hybrid coordination function (HCF) access through tiered contention and overlapped wireless cell mitigation
9191971, Nov 02 2001 AT&T Properties, LLC; AT&T INTELLECTUAL PROPERTY II, L P ‘Shield’: protecting high priority channel access attempts in overlapped wireless cells
9270606, Nov 03 2000 AT&T Properties, LLC; AT&T INTELLECTUAL PROPERTY II, L P Tiered contention multiple access (TCMA): a method for priority-based shared channel access
9319906, Nov 02 2001 AT&T Properties, LLC; AT&T INTELLECTUAL PROPERTY II, L P Preemptive packet for maintaining contiguity in cyclic prioritized multiple access (CPMA) contention-free sessions
9398594, Jul 05 2001 AT&T Properties, LLC; AT&T INTELLECTUAL PROPERTY II, L P Hybrid coordination function (HCF) access through tiered contention and overlapped wireless cell mitigation
9420611, Jul 05 2001 AT&T Intellectual Property II, L.P. Hybrid coordination function (HCF) access through tired contention and overlapped wireless cell mitigation
9596702, Jun 19 2013 DSP Group Ltd.; DSP Group Ltd Dynamic sensitivity control for wireless devices
9668276, Nov 03 2000 AT&T Intellectual Property II, L.P. Tiered contention multiple access (TCMA): a method for priority-based shared channel access
9699793, Jul 05 2001 AT&T Intellectual Property II, L.P. Hybrid coordination function (HCF) access through tiered contention and overlapped wireless cell mitigation
Patent Priority Assignee Title
4611334, Aug 31 1984 Motorola, Inc. Message capturing radio data system
5164942, Sep 06 1990 AGERE Systems Inc Antenna control for a wireless local area network station
5220564, Sep 06 1990 AGERE Systems Inc Transmission control for a wireless local area network station
5369639, Sep 06 1990 AGERE Systems Inc Local area network having a wireless transmission link
5422887, Nov 27 1991 Mosaid Technologies Incorporated Medium access protocol for wireless local area network
5502724, Nov 15 1993 International Business Mahcines Corporation Communication medium access control protocol for wireless communication
5515035, Jan 26 1993 GUT, MAX B Method and equipment for bidirectional data transmission (protocol)
5553316, Jul 03 1992 Agere Systems, INC Power control method in a wireless communication system
5638449, Jan 26 1993 CONVERSANT INTELLECTUAL PROPERTY MANAGEMENT INC Data transmission installation of the radio network type, and corresponding process
5657326, Dec 20 1994 HEWLETT-PACKARD DEVELOPMENT COMPANY, L P Radio based collision detection for wireless communication system
5721733, Oct 13 1995 General Wireless Communications, Inc.; GENERAL WIRELESS COMMUNICATIONS INC Wireless network access scheme
////////////////////
Executed onAssignorAssigneeConveyanceFrameReelDoc
Aug 20 1997BOER, JANLucent Technologies, INCASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0087020374 pdf
Aug 20 1997VAN BOKHORST, HENDRIKLucent Technologies, INCASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0087020374 pdf
Aug 20 1997DIEPSTRATEN, WILHELMUS JOSEPHUSLucent Technologies, INCASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0087020374 pdf
Aug 20 1997MUD, RIENKLucent Technologies, INCASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0087020374 pdf
Aug 20 1997VAN DRIEST, HANSLucent Technologies, INCASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0087020374 pdf
Aug 26 1997KAMERMAN, ADRIAANLucent Technologies, INCASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0087020374 pdf
Aug 26 1997KOPMEINERS, ROBERT JOHNLucent Technologies, INCASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0087020374 pdf
Sep 08 1997Lucent Technologies, Inc.(assignment on the face of the patent)
Jan 31 2001Lucent Technologies IncAgere Systems Guardian CorpASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0117960615 pdf
Apr 02 2001AGERE SYSTEMS GUARDIAN CORP DE CORPORATION CHASE MANHATTAN BANK, AS ADMINISTRATIVE AGENT, THECONDITIONAL ASSIGNMENT OF AND SECURITY INTEREST IN PATENT RIGHTS0116670148 pdf
Aug 22 2002Agere Systems Guardian CorpAGERE Systems IncMERGER SEE DOCUMENT FOR DETAILS 0350580884 pdf
Sep 30 2002JPMORGAN CHASE BANK F K A THE CHASE MANHATTAN BANK Agere Systems Guardian CorpTERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS0133720662 pdf
Jul 24 2012AGERE Systems IncAgere Systems LLCMERGER SEE DOCUMENT FOR DETAILS 0350580895 pdf
May 06 2014Agere Systems LLCDEUTSCHE BANK AG NEW YORK BRANCH, AS COLLATERAL AGENTPATENT SECURITY AGREEMENT0328560031 pdf
May 06 2014LSI CorporationDEUTSCHE BANK AG NEW YORK BRANCH, AS COLLATERAL AGENTPATENT SECURITY AGREEMENT0328560031 pdf
Aug 04 2014Agere Systems LLCAVAGO TECHNOLOGIES GENERAL IP SINGAPORE PTE LTD ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0350590001 pdf
Feb 01 2016DEUTSCHE BANK AG NEW YORK BRANCH, AS COLLATERAL AGENTAgere Systems LLCTERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS RELEASES RF 032856-0031 0376840039 pdf
Feb 01 2016DEUTSCHE BANK AG NEW YORK BRANCH, AS COLLATERAL AGENTLSI CorporationTERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS RELEASES RF 032856-0031 0376840039 pdf
Feb 01 2016AVAGO TECHNOLOGIES GENERAL IP SINGAPORE PTE LTD BANK OF AMERICA, N A , AS COLLATERAL AGENTPATENT SECURITY AGREEMENT0378080001 pdf
Jan 19 2017BANK OF AMERICA, N A , AS COLLATERAL AGENTAVAGO TECHNOLOGIES GENERAL IP SINGAPORE PTE LTD TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS0417100001 pdf
Date Maintenance Fee Events
May 16 2003M1551: Payment of Maintenance Fee, 4th Year, Large Entity.
May 28 2003ASPN: Payor Number Assigned.
May 28 2003RMPN: Payer Number De-assigned.
May 10 2007M1552: Payment of Maintenance Fee, 8th Year, Large Entity.
May 13 2011M1553: Payment of Maintenance Fee, 12th Year, Large Entity.


Date Maintenance Schedule
Nov 16 20024 years fee payment window open
May 16 20036 months grace period start (w surcharge)
Nov 16 2003patent expiry (for year 4)
Nov 16 20052 years to revive unintentionally abandoned end. (for year 4)
Nov 16 20068 years fee payment window open
May 16 20076 months grace period start (w surcharge)
Nov 16 2007patent expiry (for year 8)
Nov 16 20092 years to revive unintentionally abandoned end. (for year 8)
Nov 16 201012 years fee payment window open
May 16 20116 months grace period start (w surcharge)
Nov 16 2011patent expiry (for year 12)
Nov 16 20132 years to revive unintentionally abandoned end. (for year 12)